No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
'''User identification''' is |
'''User identification''' is |
||
− | {{Quote|the [[process]], usually through a unique [[character string]], by which a [[user]] [[identifies]] himself to the [[system]] as a [[valid user]].<ref>This definition uses content from the [https://wiki.internet2.edu/confluence/display/itsg2/Glossary Information Security Guide 2 - Glossary,] which is made available under the [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License 3.0 Unported.]}} |
+ | {{Quote|the [[process]], usually through a unique [[character string]], by which a [[user]] [[identifies]] himself to the [[system]] as a [[valid user]].<ref>This definition uses content from the [https://wiki.internet2.edu/confluence/display/itsg2/Glossary Information Security Guide 2 - Glossary,] which is made available under the [http://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution License 3.0 Unported.]</ref>}} |
{{Quote|[a] unique symbol or [[character string]] that is used by an [[Information System]] ([[IS]]) to uniquely [[identify]] a specific [[user]].<ref>[[Glossary of Security Terms, Definitions, and Acronyms]], at 259.</ref>}} |
{{Quote|[a] unique symbol or [[character string]] that is used by an [[Information System]] ([[IS]]) to uniquely [[identify]] a specific [[user]].<ref>[[Glossary of Security Terms, Definitions, and Acronyms]], at 259.</ref>}} |
||
+ | |||
+ | == References == |
||
+ | <references /> |
||
== See also == |
== See also == |
Revision as of 16:01, 4 September 2014
Definition
User identification is
“ | the process, usually through a unique character string, by which a user identifies himself to the system as a valid user.[1] | ” |
“ | [a] unique symbol or character string that is used by an Information System (IS) to uniquely identify a specific user.[2] | ” |
References
- ↑ This definition uses content from the Information Security Guide 2 - Glossary, which is made available under the Creative Commons Attribution License 3.0 Unported.
- ↑ Glossary of Security Terms, Definitions, and Acronyms, at 259.